12,999 research outputs found

    Fighting Terrorism and Preserving Civil Liberties

    Get PDF

    The European Security Industry: A Research Agenda

    Get PDF
    The security industry can be defined, in the first instance, as the industry that produces the goods and services required to protect citizens from insecurity. Yet, this industry, as opposed to defence, has not been an area of intense research. Their boundaries are unclear and the industry is not well characterised. This paper analyses this knowledge gap and presents some ideas for a research agenda for this industry that could assist in unveiling the main features, the potential weaknesses and strengths, and the capability to solve the security needs of society in an efficient and effective way. The paper discusses a definition of this economic sector useful in setting its boundaries, and it briefly describes the main types of industries operating within the sector. It analyses methods for gathering information regarding the industry, customers, and other market agents. Finally, it outlines ways for assessing market performance in terms of the structure-conduct-performance paradigm.security industry, security market, terrorism and organised crime countermeasures, competition, market performance

    Think Tank Review Issue 65 March 2019

    Get PDF

    President Fainstein\u27s 88th Commencement Address

    Get PDF
    President Fainstein advises graduates: I do not insist that you all see four decades of history my way or draw the same lessons as I do. But, please, don’t wait for things to fall apart before you take a hard look at the world and act to make it a better place — better according to each of your lights, better according to the values each of you holds dear

    Meeting the Challenge of Cyberterrorism: Defining the Military Role in a Democracy

    Get PDF
    Denna forskningskonsumtion strÀvar efter att utifrÄn tvÄ frÄgestÀllningar undersöka dels var det deliberativa samtalets möjligheter och begrÀnsningar ligger, dels undersöka hur det deliberativa samtalet pÄverkar lÀrarrollen i klassrummet. Detta sker genom en systematisk litteraturstudie som behandlar ett urval av relevanta svenska författare och Àven ett par internationella engelsksprÄkiga författare. Det deliberativa samtalet Àr en kommunikativ metod dÀr samförstÄelse, konsensus och demokrati stÄr i fokus. Tomas Englund, en av de mest uppmÀrksammade föresprÄkare av metoden beskriver det deliberativa samtalet med en rad punkter. Dessa punkter beskriver samtalet som att det ska ge olika argument utrymme, samtalet ska vara tolerant, samtalet ska ha inslag av kollektiv viljebildning, traditionella uppfattningar ska ifrÄgastÀllas och samtalet ska helst utesluta lÀrarledning. Det deliberativa samtalet har av bl.a. Skolverket lyfts fram som en  metod som ska gynna vÀrdegrundsarbetet i skolan. Runt millenieskiftet hade det deliberativa samtalet samt vÀrdegrundsarbetet fÄtt en allt mer central del i skolan dÀr Tomas Englund var en av de mest framtrÀdande föresprÄkarna av metoden. Ytterligare styrkor i samtalet kunde Àven förstÄs som dess potential i att kunna implementeras i andra kommunikativa situationer inom flertalet Àmnen. Trots att föresprÄkarna av det deliberativa samtalet kan lyfta mÄnga styrkor hos metoden finns fortfarande flera invÀndningar. De frÀmsta styrkorna som lyfts ur det deliberativa samtalet Àr vÀrdegrundsarbetet och samtalets tillÀmpningsbarhet, men de mer kritiska författarna vill gÀrna uppmÀrksamma hur det tÀmligen strukturerade samtalet kan pÄverka klassrummet och dess dynamik mellan lÀrare och elever. Hur ska exempelvis lÀraren förena sin position som betygsÀttande maktfigur med att hÄlla samtalet sÄ öppet och tolererande som möjligt, oavsett Äsikter som tas upp? Hur ska retoriska fÀrdigheter hos eleverna behandlas nÀr samtalet ska vara öppet och inkluderande? Forskningskonsumtionen lyfter Àven hur sociala och kulturella faktorer spelar in pÄ elevers förmÄga att deltaga i samtalet och lyfter genom författarna fram en diskussion om samtalets lÀmplighet i klassrummet, frÀmst genom dess deltagare som utgÄngspunkt. Slutsatsen hÀrleds till att lÀmpligheten hos det deliberativa samtalet i klassrummet kan kondenseras ned till frÄgan om förutsÀttningarna i klassrummet. Det deliberativa samtalet Àr ingen universallösning för vÀrdegrundsarbete, men har samtidigt en rad andra styrkor som Àr vÀrda att lyfta fram. Författarna saknar Àven en enhÀllig lösning över vilken roll lÀraren ska ha i samtalet och saknar Àven en riktig diskussion om hur det deliberativa samtalet ska behandla konflikter nÀr samtalet drivs till sin spets

    Risky business: managing electronic payments in the 21st Century

    Get PDF
    On June 20 and 21, 2005, the Payment Cards Center of the Federal Reserve Bank of Philadelphia, in conjunction with the Electronic Funds Transfer Association (EFTA), hosted a day-and-a-half forum, “Risky Business: Managing Electronic Payments in the 21st Century.” The Center and EFTA invited participants from the financial services and processing sectors, law enforcement, academia, and policymakers to explore key topics associated with the challenge of effectively managing risk in a payments environment that is increasingly electronic. The meeting’s goal was to identify areas of potential risk and explore interindustry solutions. This paper provides highlights from the forum presentations and ensuing conversations.

    Cybersecurity: mapping the ethical terrain

    Get PDF
    This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others. Foreword Governments and society are increasingly reliant on cyber systems. Yet the more reliant we are upon cyber systems, the more vulnerable we are to serious harm should these systems be attacked or used in an attack. This problem of reliance and vulnerability is driving a concern with securing cyberspace. For example, a ‘cybersecurity’ team now forms part of the US Secret Service. Its job is to respond to cyber-attacks in specific environments such as elevators in a building that hosts politically vulnerable individuals, for example, state representatives. Cybersecurity aims to protect cyberinfrastructure from cyber-attacks; the concerning aspect of the threat from cyber-attack is the potential for serious harm that damage to cyber-infrastructure presents to resources and people. These types of threats to cybersecurity might simply target information and communication systems: a distributed denial of service (DDoS) attack on a government website does not harm a website in any direct way, but prevents its normal use by stifling the ability of users to connect to the site. Alternatively, cyber-attacks might disrupt physical devices or resources, such as the Stuxnet virus, which caused the malfunction and destruction of Iranian nuclear centrifuges. Cyber-attacks might also enhance activities that are enabled through cyberspace, such as the use of online media by extremists to recruit members and promote radicalisation. Cyber-attacks are diverse: as a result, cybersecurity requires a comparable diversity of approaches. Cyber-attacks can have powerful impacts on people’s lives, and so—in liberal democratic societies at least—governments have a duty to ensure cybersecurity in order to protect the inhabitants within their own jurisdiction and, arguably, the people of other nations. But, as recent events following the revelations of Edward Snowden have demonstrated, there is a risk that the governmental pursuit of cybersecurity might overstep the mark and subvert fundamental privacy rights. Popular comment on these episodes advocates transparency of government processes, yet given that cybersecurity risks represent major challenges to national security, it is unlikely that simple transparency will suffice. Managing the risks of cybersecurity involves trade-offs: between security and privacy; individual rights and the good of a society; and types of burdens placed on particular groups in order to protect others. These trade-offs are often ethical trade-offs, involving questions of how we act, what values we should aim to promote, and what means of anticipating and responding to the risks are reasonably—and publicly—justifiable. This Occasional Paper (prepared for the National Security College) provides a brief conceptual analysis of cybersecurity, demonstrates the relevance of ethics to cybersecurity and outlines various ways in which to approach ethical decision-making when responding to cyber-attacks

    Customer Due Diligence and Its Role To Prevent The Global Economic Threat: Indonesian Anti Money Laundering Perspectives

    Get PDF
    Money laundering and financing of terrorism is one of the global threats which may occur problems for the economics of the world. The effect of Money Laundering and financing of terrorism have been manifested in the life of the nations. According to its characteristic as a transnational crime, Money laundering and financing of terrorism have been a major concern of all the countries and law enforcement agents. In this situation, law shall be a major instrument to tackle money laundering and financing of terrorism, but Customer Due Diligence and Enhance Due Diligence plays a great part to prevent money laundering and other variant of crime. The effective and efficient measure to recognize the customer who has a suspicious character of money laundering and financing of terrorism is using the method of knowing correctly and precisely their customer’s profile. Customer Due Diligence is the first resort which may operate as the first procedure which should be taken by all Financial Services Provider and also Goods and Services Providers. As a tool, Customer Due Diligence should be followed by the professionalism and awareness of the parties involved, such as bank and goods and service providers, since it is not easy to recognize the money laundering and also financing of terrorism. The presence of Law Number 8 of 2010 of Republic of Indonesia actually tries to strengthen the implementation of the Principle of Know Your Services Users or also known as the Know Your Customer Principle
    • 

    corecore